exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files from Federico Fazzi

First Active2006-06-11
Last Active2015-07-03
Snorby 2.6.2 Cross Site Scripting
Posted Jul 3, 2015
Authored by Federico Fazzi

Snorby version 2.6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 94c15120b89c9cb6d9e68b41fcad99033963277c4065ef72edc9c41bc5c24e6d
0xf_ftpxq.c
Posted Oct 27, 2006
Authored by Federico Fazzi

0xf_ftpxq.c - FTPXQ Denial of service exploit.

tags | exploit, denial of service
SHA-256 | 17cffd597c28ed6f74c92fc0b1f188134a9142a7841dde1b098fb31dddcd101f
FSA-018.txt
Posted Jun 26, 2006
Authored by Federico Fazzi

Calendarix version 0.7.20060401 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 33d601c6b1e33ec20e204dcefef3509ac2501d20bcfcabfd06bc3a94939a292e
FSA-017.txt
Posted Jun 26, 2006
Authored by Federico Fazzi

HotPlugCMS version 1.0 is susceptible to a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 23c7138c7a38ad5a3ac8ab444cab9e0365e9c8ab9c894592e8b50bc8a813cd28
FSA-016.txt
Posted Jun 21, 2006
Authored by Federico Fazzi

ISPConfig version 2.2.3 suffers from a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | 0ce51a0eb669a71280121c993647ac850f69808abd774582659f13f3d677703b
phpbluedragon.txt
Posted Jun 21, 2006
Authored by Federico Fazzi

PhpBlueDragon CMS version 2.9.1 suffers from a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | f226641ed0cdc748c98884ae86130291b073a22e86a98e35d0d15d5a3868a57d
Content-Builder-0.7.5.txt
Posted Jun 14, 2006
Authored by Federico Fazzi

Content-Builder (CMS) 0.7.5 suffers from a flaw that allows for remote command execution.

tags | advisory, remote
SHA-256 | 437aee474cf5b0652f4cbd173aa3119233d6255e04fae5396bd98eaf60d404e1
FSA-011.txt
Posted Jun 14, 2006
Authored by Federico Fazzi

FSA:011: AWF CMS 1.11, Remote command execution.

tags | advisory, remote
SHA-256 | 8e672eedf452e70aa2109ed32dce0e0fefd9ce6750d2f439963446bca8373713
f_pc-1.2.1pl2.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

phpCMS version 1.2.1pl2 suffers from a remote command execution flaw.

tags | exploit, remote
SHA-256 | 3cf88a48b33ba569bf449d8e82a4535323b85c4cf16e3605dcc76e36e69dc3a6
f_dp-6.1.x.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

DCP-Portal version 6.1.x suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 32b528ab45e8526bc7fed4fd5f5e1c85d539b198d583c8a2a64a948e5d1ef5bd
f_cbc-0.7.5.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Content-Builder (CMS) version 0.7.5 is susceptible to multiple remote command execution vulnerabilities.

tags | exploit, remote, vulnerability
SHA-256 | eae7ab62dcec19ad0d73639301f30c28539436f4e1bd29173593cdda1e033d73
f_ac-1.11.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

AWF CMS version 1.11 is susceptible to a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 60c2fde0d4482d73bf436c74017b614d7d68621c026f99e8bdbdfc8fc94e7f6f
f_0k-0.1.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

0verkill version 0.16 remote integer overflow denial of service exploit.

tags | exploit, remote, denial of service, overflow
SHA-256 | bac493533dcb48792b7d6b8cc86bcfed5ddd0d2c1c8b7c6b55196f68349aaee6
DoceboLms303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo Lms version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 7e5f86b1ae364da574479a6b204798c843c00e20b2d557a1cd3194972103a9b9
DoceboKms303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo Kms version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | aff9b072b446193d9defc58c9557447584f2ba1a656990d522ffc4ea7ef71e08
DoceboCMS303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo CMS version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | af547381eb822efc50972d0a109543bfea888442ab8f5daf8c425f668748dea7
Back-end0721.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Back-end version 0.7.2.1 remote command execution exploit that makes use of jpcache.php.

tags | exploit, remote, php
SHA-256 | d9fdd92864264785d35fa24e0adc6d7412596b2fa226693c4949819315f4ae65
Bookmark4U.pl.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Bookmark4U versions 2.0 and below remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | 058e3fcd3f73b98b6c6acbdb9666aff13dd25b3ed9cfb80ac6696b671de40384
CyBoard125.c
Posted Jun 12, 2006
Authored by Federico Fazzi

CyBoard PHP Lite versions 1.25 and below remote file inclusion exploit.

tags | exploit, remote, php, file inclusion
SHA-256 | 936f47c9c9c2fc16f3b680f6ce727ead3ade1986f9843d500bce894830be3213
dreamaccount.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

DreamAccount versions 3.1 and below remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | fe2eea244668a6dddcc67bc41726893b6307b4c572278854b565f505a8ef1a80
f_bloggit-1.01.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

BloggIt versions 1.01 and below suffer from an arbitrary code execution flaw via admin.php.

tags | advisory, arbitrary, php, code execution
SHA-256 | 7b52e7137e8f9fb7847958ed8511bf50d92882679c7881c96db9dab26f59e090
f_mg-2.62.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

MiraksGalerie versions 2.62 and below remote command execution exploit that makes use of a file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 83b0da3eb0978e2ba1200c09bc37db5c4b06803b49db2f5a76779974618c9583
Webserver4D.txt
Posted Jun 11, 2006
Authored by Federico Fazzi

Web server 4D 3.6.0 remote DOS exploit.

tags | exploit, remote, web
SHA-256 | 9ecb021967a204a4e0c6a30ce25bba730abc3141dc7ffad2d9d627831ae2f3b7
MyServer-0.5.txt
Posted Jun 11, 2006
Authored by Federico Fazzi

MyServer 0.5 denial of service exploit.

tags | exploit, denial of service
SHA-256 | c5eff9bd4d626f2c87231b61b8aa13dcaccb0941e2392a5a2cd80a30c7397ca7
BloggIT-1.01.txt
Posted Jun 11, 2006
Authored by Federico Fazzi

BloggIT versions 1.01 or prior suffer from arbitrary code execution vulnerabilities.

tags | advisory, arbitrary, vulnerability, code execution
SHA-256 | 0bc85b59e1874ae02b9adfb22039712f92ab2077543dbbb82d04516b39963b9b
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close